Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 1,097 public repositories matching this topic...
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
May 31, 2024 - C#
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
-
Updated
May 31, 2024 - C++
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
-
Updated
May 31, 2024 - C++
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
-
Updated
May 31, 2024 - C#
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
May 31, 2024 - C#
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
May 31, 2024 - C++
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
-
Updated
May 31, 2024 - Python
Hourly updated database of exploit and exploitation reports
-
Updated
May 31, 2024 - Python
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
May 31, 2024
The Common Vulnerabilities Exposures (CVE) Database
-
Updated
May 31, 2024
All published CVE and their recent changes, ready to be used by humans and machines
-
Updated
May 31, 2024
Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )
-
Updated
May 31, 2024 - Python
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.
-
Updated
May 31, 2024 - Python
WordPress Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution
-
Updated
May 31, 2024 - Python
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
-
Updated
May 31, 2024 - Ruby
- Followers
- 113 followers
- Wikipedia
- Wikipedia